• Classroom
Course Description

Cybersecurity Awareness for personnel providing security for organizational systems. Topics include the Cyber in the News and Current Events; National Cyber Chain of Command and Reporting Procedure; Cyber Law and the IT Security Policy Framework; Risk and Network Management Frameworks; Cyber Incident Response; Containment, Eradication, and Recovery; the Cyber Environment; Managing Network Devices; and Cybersecurity Response Exercises. 2 days, instructor-led, on-site or off-site. Training takes place within Metova's Cyberoperations Enhanced Network and Training Simulators (CENTS) realistic, immersive training emulator.

Learning Objectives

1. Apply critical thinking and legislation/directives to assist in security the network. 2. Identify cybersecurity chains of command and reporting structures. 3. Discuss national and international laws, regulations, policies, and ethics as they relate to cybersecurity. 4. Discuss the use, purpose, and implementation of cybersecurity principles to support defense-in-depth of the network. 5. Define information assurance (IA), mission assurance (MA), and organizational requirements to protect confidentiality, integrity, availability, authenticity, and non-repudiation of information and data. 6. Describe incident categories, incident responses, and timelines for responses. 7. Examine strategies for containing, eradicating, and recovering from an incident. 8. Perform network enumeration to become familiar with the network environment. 9. Manage devices by implementing security tools. 10. Perform cybersecurity response actions for a variety of simulated cyber incidents and operate as a team to manage a multi-faceted, advanced, persistent, simulated threat.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management
  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Incident Response
  • Vulnerability Assessment and Management
  • Digital Forensics
  • Cyber Operations